Talk:AES instruction set

From Wikipedia, the free encyclopedia
Jump to: navigation, search
WikiProject Cryptography / Computer science  (Rated Start-class, Low-importance)
WikiProject icon This article is within the scope of WikiProject Cryptography, a collaborative effort to improve the coverage of Cryptography on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the quality scale.
 Low  This article has been rated as Low-importance on the importance scale.
Taskforce icon
This article is supported by WikiProject Computer science (marked as Low-importance).
 
WikiProject Computing (Rated Start-class, Low-importance)
WikiProject icon This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
Start-Class article Start  This article has been rated as Start-Class on the project's quality scale.
 Low  This article has been rated as Low-importance on the project's importance scale.
 

Software supporting AES instruction set[edit]

Would anyone object to limiting software to software libraries? It seems like the list will grow until it is unmanageable if the only restriction is software. If the restriction is software libraries, the growth will be checked, and it will provide useful information for programmers who need a list of supporting libraries.

JW Noloader (talk) 02:00, 13 August 2010 (UTC)

Windows' Bitlocker should also be added to the list. 72.80.29.25 (talk) 14:55, 12 July 2011 (UTC)

I don't see any evidence that [Oracle] Java 7 HotSpot supports AES. Java 8 appears to, based on the appearance of new "intrinsics" and my own performance testing. twimoki (talk) 03:21, 24 June 2013 (UTC)

Security[edit]

There is no discussion about security implications. In the non-hw assisted case the CPU has a hard time figuring out what is your key. In this case, you're essentially giving a black box your key, AND telling it the semantics too "this here is my key".

How can you be sure there isn't (for example) a built-in SRAM cache which stores the most-recently used 500 keys?

94.254.76.147 (talk) 09:37, 2 June 2011 (UTC)

Comparison with a Pentium 4[edit]

I think this comparison is...questionable. Especially considering, that a Pentium 4 is well known to have the worst IPC of its generation, and was out of date by three generations by the time AES-NI became available, including one major and one minor architectural change. So looking at the cycles per byte of the worst offender of long pipelines, with the Netburst architecture, and the cycles per byte using optimized, dedicated logic is very strange. A comparison with a pure software implementation on the same platform would be interesting, or maybe with a previous platform, but a comparison with a P4 appears rather useless. 193.49.124.107 (talk) 08:27, 17 August 2011 (UTC)

Evaluation of the Carryless multiplication[edit]

The carryless multiplication instruction is also discussed here: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4358294&tag=1 and here: http://vega.dii.unisi.it/~giorgi/papers/Branovic03a.pdf — Preceding unsigned comment added by Robgiorgi (talkcontribs) 10:53, 8 June 2014 (UTC)